1 |
ISO/IEC 20922:2016 Information technology: Message Queuing Telemetry Transport (MQTT) v3.1.1, June 2016
|
2 |
Z. Shelby, K. Hartke, and C. Bormann, "The Constrained Application Protocol," IETF RFC 7252, June 2014.
|
3 |
M. Kovastsch, "A Low-Power CoAP for Contiki", IEEE Mobile Adhoc and Sensor System(MASS), 2011.
|
4 |
L. Seitz, S. Gerdes, G. Selander, M. Mani, and S. Kumar, "Use Cases for Authentication and Authorization in Constraint Environments," IETF RFC 7744, Jan. 2016.
|
5 |
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," IETF RFC 6347, Jan. 2012.
|
6 |
S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," IEEE Sensors Journal, 13(10), 3711-3720, October 2013.
DOI
|
7 |
IEEE std. 802.15.4-2011, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs), Standard for Information Technology Std., June 2011.
|
8 |
G. Montenegro, N. Kushalnagar, J. Hui, and D. Culler, "Transmission of IPv6 Packets over IEEE 802.15.4 Networks," IETF RFC 4944, Sep. 2007.
|
9 |
S. Raza, L. Seitz, D. Sitenkov, and G. Selander, "S3K: Scalable Security with Symmetric Keys - DTLS Key Establishment for the Internet of Things," IEEE Transactions on Automation Science and Engineering, 2016.
|
10 |
R. Hummen, J. Ziegeldorf, H. Shafagh, S. Raza, and K. Wehrle, "Towards Viable Certificate-based Authentication for the Internet of Things," in Proc. of the 2nd ACM Workshop on Hot Topics on Wireless Security and Privacy, pp. 37-42, 2013.
|
11 |
Contiki Community, Cooja Simulator, http://www.contiki-os.org/start.html.
|
12 |
S. Santesson, M. Myers, R. Ankney, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP", IETF RFC 6960, 2015.
|